Action not permitted
Modal body text goes here.
CVE-2010-0382
Vulnerability from cvelistv5
Published
2010-01-22 21:20
Modified
2024-08-07 00:45
Severity ?
EPSS score ?
Summary
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "name": "oval:org.mitre.oval:def:7086", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "name": "ADV-2010-1352", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1352" }, { "name": "40086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/40086" }, { "name": "ADV-2010-0622", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "oval:org.mitre.oval:def:6665", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-2054", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2054" }, { "name": "oval:org.mitre.oval:def:11753", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-19T00:00:00", "descriptions": [ { "lang": "en", "value": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "name": "oval:org.mitre.oval:def:7086", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "name": "ADV-2010-1352", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1352" }, { "name": "40086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/40086" }, { "name": "ADV-2010-0622", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "oval:org.mitre.oval:def:6665", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-2054", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2054" }, { "name": "oval:org.mitre.oval:def:11753", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.isc.org/advisories/CVE-2009-4022v6", "refsource": "CONFIRM", "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "name": "oval:org.mitre.oval:def:7086", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "name": "ADV-2010-1352", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1352" }, { "name": "40086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40086" }, { "name": "ADV-2010-0622", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "oval:org.mitre.oval:def:6665", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-2054", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2054" }, { "name": "oval:org.mitre.oval:def:11753", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0382", "datePublished": "2010-01-22T21:20:00", "dateReserved": "2010-01-22T00:00:00", "dateUpdated": "2024-08-07T00:45:12.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-0382\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-01-22T22:00:00.757\",\"lastModified\":\"2017-09-19T01:30:22.313\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.\"},{\"lang\":\"es\",\"value\":\"ISC BIND 9.0.x a 9.3.x, 9.4 en versiones anteriores a la 9.4.3-P5, 9.5 en versiones anteriores a la 9.5.2-P2, 9.6 en versiones anteriores a la 9.6.1-P3, y 9.7.0 beta maneja de manera inapropiada los datos de acompa\u00f1amiento de una respuesta segura sin volver a consultar a la fuente original, lo que permite a atacantes remotos tener un impacto no especificado mediante una respuesta manipulada, tambi\u00e9n conocido como Bug 20819. NOTA: esta vulnerabilidad existe debido a una regresi\u00f3n durante la soluci\u00f3n de CVE-2009-4022.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":7.6},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":4.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52373DC-3E05-424B-9C78-4092A75C75A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE06E29-0A16-4034-A2BB-696A49798F00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CECA87-F721-429B-8062-D3297233C14D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F1447B1-A25F-45CC-B721-3204D7107999\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61FB240-C932-4A3A-874D-5872F01EB352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"999AF289-8D73-4648-ABCB-4853B9B1F230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6743968D-DDB2-4478-867A-642CCC492B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098633E6-88F0-4DBC-986F-D11EDA29877F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"78725CCE-C153-4B00-8E76-ED6DFC1C86A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1950F046-FBD4-4A92-BA70-5E80374A12AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1861756C-CC81-4EAB-8427-57A3C62BFF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E53EFD9-16B8-457D-8C27-7771018EA524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD642FC-1764-4090-A32D-830CEAE69E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"79503328-9EE2-414E-A6E8-B3BABA0D6CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABA5AA3-8951-4158-A4C6-64BE2010D39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A2D767-8E2D-4D65-ACF3-634B055023CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28C3D4C-5C3B-4686-9F67-6379C2AC338A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DE620-09A2-4055-B30C-803C714237B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C16513C-48A1-4FB6-AB11-F844ABC4BB66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"607BF60B-27F1-4C85-BB5F-D66FEA05CD4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE954FD0-56AF-4757-BAA8-B0C64703F6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC243E5-D80C-43A8-AD12-5DA0FA442086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF891263-4ACE-47C3-83F3-C06E49F32451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C3704B-8328-46C3-ACB1-D27FD7DED508\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9000CE-EB3A-4194-84D1-4BB4C5010D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A4E6C3-CF69-4A81-B179-EB8F656E72AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F947835-8E96-4793-B81E-EEC103BF0CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6520F4-B203-400A-8629-8A40B739DB11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D7907A-46D1-4F7D-8B2F-321214204704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B06686CF-0FFD-45D8-A9F6-D13DCF3E6EB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF04613-7F33-4A63-A776-47C9A0BDBF1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3C3939-2065-4A8C-99F8-BE44D1D2ABA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE416F3-CDAE-4285-9EC7-F3E161EDCA0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"365BFA38-A0F6-4D48-A6B5-E534F88516DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2F3360-F5C2-47C1-B2E7-935CDB47407A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"52FBAE24-C9F7-4756-A7A0-A877ABFC3444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7230CE4-CD95-484C-A004-457FD4484403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0BB3172-BFBC-4F56-8116-6EEC30FD566F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40FB919-A955-419D-9BEC-835F93E4FEF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8A8F48-A890-4837-8C76-1A690523B39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"399D70C9-8E61-4624-A7AD-9410AA7641B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB2F03D-96C6-49CD-80FA-570FF72B493F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DC3DF4-4B36-4AA8-8561-C4255A8C4E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AF07E87-B109-4B15-A358-7A454502E077\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E5D0852-413F-4875-93F5-64DDBCA6E85E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"301BF336-6AF6-4705-9BF1-00ED6608F572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614C9459-D526-4880-AE03-4A1558CB941F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8B15E71-656A-4EB7-96B2-2CC9A2C19DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A969C3E7-9E4F-4767-86D1-7E6B3970A7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B56EBF-6218-46B7-A9F2-288E40635FAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CFA05CD-0BE4-4E85-A3DE-8B3E2622159F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10ACCBC-6697-4BCB-9748-B966D83E0C03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"719382EA-7D4E-46F2-92ED-DCA83AE685BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDF0B51-76D3-4BD8-A2C7-6F21153CB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D800F08-9B7A-4284-B2EF-DCDF60DEEC04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D43375C5-0736-43DE-99B5-B75719D0AD0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E492452-CBDB-43BC-A9AD-21AA84EA0653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BD68D9-6CD9-48A7-A242-38B9ADD420BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"65C15AB2-DCA7-4983-A741-3CA1D4A391A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C6DB780-C075-462C-B426-1917A020C4BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B4FD922-49B2-4953-8EF2-9018B104BC20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"367DC15C-7174-4463-8D4B-B3E43AC0A57E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAEC7B62-DBBF-4ADD-81F7-8AD1F3642E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4360536-0BA6-41DB-AA87-45AFB51562CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3CBD1CC-14DF-4F00-9A5E-6D7A6604A8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C5ED24-5A13-4F06-BC9F-B8B8F46C1888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"438AEC8C-DD71-4A25-9E9D-A89415F7EC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"36A47938-C5AC-4471-A791-6F21AE20B85C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDF6B08-6BA8-400C-BF01-ABD2306FE0D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFEDAAA4-AB94-43C6-97AE-B6E87D8E81B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF29410-5230-42F9-BC07-B940FC66DA62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"82068202-DF42-4808-A5C7-1A68B05EA1C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3014690C-784C-487D-A378-4B977C8460E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E4653A-C63A-4568-BFF2-ECAB7AB5A55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF6B377-2B03-429D-B452-3269E6FA8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA93166-513D-40AA-9855-FC89060BA03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"847C1017-F964-4A33-BEA8-DDB202DD0FB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B48470-26BF-4AE5-BEF3-7A2C82D59513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D795C310-AC2A-4680-B516-508F7AF584AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA7F932-4DA1-4B03-8761-AB2353B4935E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC0048-3DC4-40A7-99A2-7686B3DA4FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43C77D0-2052-417D-9EA8-1A89A06BF010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F574AA97-6037-4957-9BDD-6C720B3A292B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B67499F-7A9D-467B-834B-F4D61DBBE313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0D8854-64B6-42C9-B4D2-B2AF16AC0F03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB6CACC-3E1E-4115-AC9B-C9F99522D4C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"062A3D39-9B49-49D3-8FB4-FB4FC4A71D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F95086-3107-4C38-BB3B-7BABA9BD15C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8669EA1C-DAA7-44FC-B675-01641BB8787E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE49740-2220-4305-BB8A-80E56CF4D9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD5E3F3-CAF7-4A41-A26E-087D74799EF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9730D243-BBDF-483B-B709-7EDF708CE277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD0B6DB-91E5-4891-BA45-A68BEA6FBB51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5B579EF-A538-4AA4-BDE8-CDB39E155A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23BFA179-11A1-436D-805A-9814B85AEEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D881EBA-B012-4014-A08F-F6B3795653C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9431455C-07E8-40E7-87D9-E6FE6F53D76D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CA8370-ACF5-4DEC-8D3C-C502A97A101C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A92E77F8-43FE-49C7-BCDA-1F6E8EB0DD2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C8B18D7-4D15-46A7-8013-E6267127A427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7C7524-6943-4D94-8835-0221F0F0CD63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B45FE3-307E-4599-B2CF-5203FA606469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12E3841-1CF0-4969-A286-50769BAE31EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8B11586-1274-422D-873A-25DF193FB0C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D61CDA-BB78-4957-A502-6D77B567B3F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A31533C-BD6E-4EB4-8047-3257BF51F592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8537C88-4F73-43DD-9BDC-AF470882EED2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7D1A96-0A8E-4E3A-9442-701E3D1A1F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C23313-817F-4AB5-9058-31B0C7F954A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA9F93EC-1AA2-43A6-9869-8974C819370A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*\",\"matchCriteriaId\":\"726720E2-4B59-4665-A72E-E2E996957EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0AA9D0-9657-4E18-BF8B-45284C2D40A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E4FEA8-A654-4E9F-8948-5878E7C427C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"916D4013-27A5-4688-A985-A9B77F90AC45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8583B8D-54A4-4064-810B-34F4F5A33A36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"932E3F02-DD98-43FC-8077-50506E512989\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C2A2FD-7AE7-462A-99B2-809BE1F35C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E01A12DF-E94B-426E-8751-96FC56105D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7717B1A2-CAF5-49F3-AC73-273074BBEE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F037EE61-50D6-4C1E-B24B-25A6D212E7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5140F118-BC25-43CB-B19C-0885A44D6646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"099A0900-9A16-4431-BECA-B02D7C810153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B9397F-463E-4F73-86F6-4EF3368E14BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC96840-758A-4A47-8D12-AA42640778C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A6BE65-7F8F-4B5E-B2BB-0290974A5358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF68DD55-F39E-480E-AE86-9ABF1B068E6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"19ADAB10-BDD0-409E-93C2-9E7223464131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42F7AF7-D37C-4213-B2BC-D2B9FE725BDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A964450E-7DA8-478B-923E-E8CD1BA0F09C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"32FAE1EF-3BF0-4B12-8F08-AA061A6D63FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABB3FC8-0A0D-4881-9137-5F6A8CCB9345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C02A3BC0-78A4-4F4D-AA5B-3C05122137EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"178C7D9F-8699-42A3-8729-0BC6323EBDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BEF53C6-E555-49D4-B4B2-63BA71CC77E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B4565A6-122B-406C-A7BE-A029F92799B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C09FA4C-B094-4BAC-A194-ACC28F80AF69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6711B30D-4B57-4DDF-BC1E-98736B23E763\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEC21220-4207-4FE4-A7A9-9B223301B98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE753CB-A16D-4605-8640-137CD4A2BB16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92ECA27E-4248-49BD-A84C-4854CCA19AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0C031F-96F1-4117-83B7-82EE749FC6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D7D5B7-5696-4B51-954E-F32DF9617D9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B953804-C53B-4C77-AAE4-C60961C23A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BBFF21-4E77-44EC-B472-6925904772AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FAA10DC-71AC-4E56-900A-B69B24917DE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A0C5E26-B896-449D-B004-337C9C0C40F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"444326E3-9D0D-4C9F-9B86-2AB6ADE1F405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"812CD568-82C1-4F44-99BA-1F1DF3AF16EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16EB6777-8E49-4B07-B859-06D0C2F29DC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2574190-E1DC-46B9-AE82-5581960D8819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB06ECC-D36F-4BE7-93BF-8B1C025298EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"54E5A7DC-D432-470A-B95A-AF8EE1ECB561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F3181D-BB94-4700-A66C-8503B7B4107C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EB2A5D6-DEDF-4962-8117-2F1FADB5B984\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B6584A-707A-463C-BB2F-1D663FE50C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35C161A-3CCC-4FFC-9698-98FAE71BBF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6518FD7D-0249-4793-9531-E5338EEC4C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D468B433-D785-4A5B-A8CC-B2F1B27BAB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCF9BD9-F557-408C-9CD7-BD0EAD66366F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"407F36C2-886C-48A7-A3AB-E5F9194775D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CEA3F3-C4F8-4BD1-92EA-AC1B54A3CFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"574C2F69-C5A0-48C6-8F13-C164518B8ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40BD4A8C-785C-4460-AB52-B249C5DC9BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AAE7145-F1BA-4BEA-841E-DEE08891A3D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"88359A5D-CE32-4920-BE5D-98EC262B41EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77760E4-57C5-4A5E-A169-C84409930757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"24E9CBCA-241C-4EF6-8C0C-FA32E81B8B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"893ACAAC-406E-4A1C-970B-A15B42961271\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/40086\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2010/dsa-2054\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0622\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/1352\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.isc.org/advisories/CVE-2009-4022v6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
rhsa-2010_0062
Vulnerability from csaf_redhat
Published
2010-01-20 15:11
Modified
2024-11-22 03:13
Summary
Red Hat Security Advisory: bind security update
Notes
Topic
Updated bind packages that fix two security issues are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols. BIND includes a DNS server (named); a resolver
library (routines for applications to use when interfacing with DNS); and
tools for verifying that the DNS server is operating correctly.
A flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was
running as a DNSSEC-validating resolver, it could incorrectly cache
NXDOMAIN responses, as if they were valid, for records proven by NSEC or
NSEC3 to exist. A remote attacker could use this flaw to cause a BIND
server to return the bogus, cached NXDOMAIN responses for valid records and
prevent users from retrieving those records (denial of service).
(CVE-2010-0097)
The original fix for CVE-2009-4022 was found to be incomplete. BIND was
incorrectly caching certain responses without performing proper DNSSEC
validation. CNAME and DNAME records could be cached, without proper DNSSEC
validation, when received from processing recursive client queries that
requested DNSSEC records but indicated that checking should be disabled. A
remote attacker could use this flaw to bypass the DNSSEC validation check
and perform a cache poisoning attack if the target BIND server was
receiving such client queries. (CVE-2010-0290)
All BIND users are advised to upgrade to these updated packages, which
contain a backported patch to resolve these issues. After installing the
update, the BIND daemon (named) will be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated bind packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Berkeley Internet Name Domain (BIND) is an implementation of the Domain\nName System (DNS) protocols. BIND includes a DNS server (named); a resolver\nlibrary (routines for applications to use when interfacing with DNS); and\ntools for verifying that the DNS server is operating correctly.\n\nA flaw was found in the BIND DNSSEC NSEC/NSEC3 validation code. If BIND was\nrunning as a DNSSEC-validating resolver, it could incorrectly cache\nNXDOMAIN responses, as if they were valid, for records proven by NSEC or\nNSEC3 to exist. A remote attacker could use this flaw to cause a BIND\nserver to return the bogus, cached NXDOMAIN responses for valid records and\nprevent users from retrieving those records (denial of service).\n(CVE-2010-0097)\n\nThe original fix for CVE-2009-4022 was found to be incomplete. BIND was\nincorrectly caching certain responses without performing proper DNSSEC\nvalidation. CNAME and DNAME records could be cached, without proper DNSSEC\nvalidation, when received from processing recursive client queries that\nrequested DNSSEC records but indicated that checking should be disabled. A\nremote attacker could use this flaw to bypass the DNSSEC validation check\nand perform a cache poisoning attack if the target BIND server was\nreceiving such client queries. (CVE-2010-0290)\n\nAll BIND users are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve these issues. After installing the\nupdate, the BIND daemon (named) will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0062", "url": "https://access.redhat.com/errata/RHSA-2010:0062" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "554851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851" }, { "category": "external", "summary": "557121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557121" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0062.json" } ], "title": "Red Hat Security Advisory: bind security update", "tracking": { "current_release_date": "2024-11-22T03:13:19+00:00", "generator": { "date": "2024-11-22T03:13:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0062", "initial_release_date": "2010-01-20T15:11:00+00:00", "revision_history": [ { "date": "2010-01-20T15:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-20T10:15:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:13:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.src", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.src", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=src\u0026epoch=30" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/caching-nameserver@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=x86_64\u0026epoch=30" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/caching-nameserver@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "product": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "product_id": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.3.6-4.P1.el5_4.2?arch=i386\u0026epoch=30" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/caching-nameserver@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=ia64\u0026epoch=30" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/caching-nameserver@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=ppc\u0026epoch=30" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=ppc64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=ppc64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=ppc64\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=ppc64\u0026epoch=30" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-utils@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/caching-nameserver@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-chroot@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-sdb@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=s390x\u0026epoch=30" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "product": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "product_id": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-debuginfo@9.3.6-4.P1.el5_4.2?arch=s390\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product_id": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-devel@9.3.6-4.P1.el5_4.2?arch=s390\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product_id": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libbind-devel@9.3.6-4.P1.el5_4.2?arch=s390\u0026epoch=30" } } }, { "category": "product_version", "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "product": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "product_id": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/bind-libs@9.3.6-4.P1.el5_4.2?arch=s390\u0026epoch=30" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.src" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.src" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" }, "product_reference": "caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-0097", "discovery_date": "2010-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "554851" } ], "notes": [ { "category": "description", "text": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not properly validate DNSSEC (1) NSEC and (2) NSEC3 records, which allows remote attackers to add the Authenticated Data (AD) flag to a forged NXDOMAIN response for an existing domain.", "title": "Vulnerability description" }, { "category": "summary", "text": "BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0097" }, { "category": "external", "summary": "RHBZ#554851", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554851" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0097", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0097" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0097", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0097" } ], "release_date": "2010-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T15:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0062" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "BIND DNSSEC NSEC/NSEC3 validation code could cause bogus NXDOMAIN responses" }, { "cve": "CVE-2010-0290", "discovery_date": "2010-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "557121" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains (1) CNAME or (2) DNAME records, which do not have the intended validation before caching, aka Bug 20737. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-4022.", "title": "Vulnerability description" }, { "category": "summary", "text": "BIND upstream fix for CVE-2009-4022 is incomplete", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0290" }, { "category": "external", "summary": "RHBZ#557121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0290", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0290" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0290", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0290" } ], "release_date": "2010-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T15:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0062" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "BIND upstream fix for CVE-2009-4022 is incomplete" }, { "cve": "CVE-2010-0382", "discovery_date": "2010-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "557983" } ], "notes": [ { "category": "description", "text": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.", "title": "Vulnerability description" }, { "category": "summary", "text": "bind: out-of-bailiwick data vulnerability due to regression while fixing CVE-2009-4022", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-0382" }, { "category": "external", "summary": "RHBZ#557983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-0382", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0382" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0382", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0382" } ], "release_date": "2010-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-20T15:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0062" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client-Workstation:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client-Workstation:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-30:9.3.6-4.P1.el5_4.2.src", "5Client:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Client:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-30:9.3.6-4.P1.el5_4.2.src", "5Server:bind-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-chroot-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-debuginfo-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libbind-devel-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.ppc64", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-libs-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-sdb-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.i386", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:bind-utils-30:9.3.6-4.P1.el5_4.2.x86_64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.i386", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ia64", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.ppc", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.s390x", "5Server:caching-nameserver-30:9.3.6-4.P1.el5_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bind: out-of-bailiwick data vulnerability due to regression while fixing CVE-2009-4022" } ] }
gsd-2010-0382
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-0382", "description": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.", "id": "GSD-2010-0382", "references": [ "https://www.suse.com/security/cve/CVE-2010-0382.html", "https://www.debian.org/security/2010/dsa-2054", "https://access.redhat.com/errata/RHSA-2010:0062", "https://linux.oracle.com/cve/CVE-2010-0382.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-0382" ], "details": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.", "id": "GSD-2010-0382", "modified": "2023-12-13T01:21:29.048786Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0382", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.isc.org/advisories/CVE-2009-4022v6", "refsource": "CONFIRM", "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "name": "oval:org.mitre.oval:def:7086", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "name": "ADV-2010-1352", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1352" }, { "name": "40086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/40086" }, { "name": "ADV-2010-0622", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "oval:org.mitre.oval:def:6665", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "DSA-2054", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2054" }, { "name": "oval:org.mitre.oval:def:11753", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.5:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:b4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.7:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.7:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.3:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.3:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.3:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.3:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.9:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.1:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.1:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.1:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:b4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:b3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.1:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.3:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:p4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.6.0:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:p5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.4.0:a5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.3:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.2:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.3.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.5:b2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.2:p3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.2:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.2.0:a3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:p2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.3:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:p1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.2:b1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:a1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1.1:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0.0:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:isc:bind:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0382" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.isc.org/advisories/CVE-2009-4022v6", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "name": "ADV-2010-0622", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "name": "DSA-2054", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2010/dsa-2054" }, { "name": "40086", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/40086" }, { "name": "ADV-2010-1352", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2010/1352" }, { "name": "oval:org.mitre.oval:def:7086", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "name": "oval:org.mitre.oval:def:6665", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "name": "oval:org.mitre.oval:def:11753", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-19T01:30Z", "publishedDate": "2010-01-22T22:00Z" } } }
ghsa-qjm2-h4v8-qrj8
Vulnerability from github
Published
2022-05-02 06:12
Modified
2022-05-02 06:12
Details
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.
{ "affected": [], "aliases": [ "CVE-2010-0382" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-01-22T22:00:00Z", "severity": "HIGH" }, "details": "ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-of-bailiwick data accompanying a secure response without re-fetching from the original source, which allows remote attackers to have an unspecified impact via a crafted response, aka Bug 20819. NOTE: this vulnerability exists because of a regression during the fix for CVE-2009-4022.", "id": "GHSA-qjm2-h4v8-qrj8", "modified": "2022-05-02T06:12:18Z", "published": "2022-05-02T06:12:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0382" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11753" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6665" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7086" }, { "type": "WEB", "url": "https://www.isc.org/advisories/CVE-2009-4022v6" }, { "type": "WEB", "url": "http://secunia.com/advisories/40086" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2010-0018" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-2054" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/0622" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/1352" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.